An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.opendesign.com/security-advisories | vendor advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf | third party advisory patch |
https://www.zerodayinitiative.com/advisories/ZDI-21-243/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-240/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-220/ | vdb entry third party advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf | third party advisory patch |